We use the solution for endpoint security.
Cyber Security Consultant at Wirespeed
An endpoint security solution with ransomware protection and EDR
Pros and Cons
- "If you're using an endpoint that does not have sufficient resources, it would be very tough to use."
What is our primary use case?
What is most valuable?
The solution provides endpoint security, ransomware protection, endpoint detection, and response. Also, cloud-based management is a good feature with an excellent catch rate.
What needs improvement?
If you're using an endpoint that does not have sufficient resources, it would be very tough to use. Most of them will shut down, but it works well with the detection so far. The solution can reduce the impact of the endpoints.
The performance impact should be improved. Also, the tool should have the ability to search for files. It could make on-premise deployment easier. They might have blocked ports and the control makes it more difficult. They can make implementation much easier even with what they have.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint as a reseller for three to four years.
Buyer's Guide
Check Point Harmony Endpoint
March 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
841,004 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
It is a very scalable solution. It is well-suited for medium business. I rate the solution’s scalability a nine out of ten.
How are customer service and support?
Technical support is responsive.
How was the initial setup?
The tool is easy to set up but the on premise management is difficult. The deployment takes three hours to complete.
I rate the initial setup a seven out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
The solution is reasonable, but there are cheaper solutions out there.
What other advice do I have?
Smaller customers go with the cloud, whereas the bigger ones opt for on-premise management.
I recommend the solution.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Cyber Security Specialist at a tech services company with 11-50 employees
Has a great encapsulation system but could use better support ticketing
Pros and Cons
- "The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
- "In terms of improvement, the ticketing system could be better. It is a little tricky to try to open a case and give it to an engineer."
What is our primary use case?
Our company uses Harmony Endpoint for encryption and encapsulation. Our clients use it for data encryption.
What is most valuable?
The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists.
What needs improvement?
In terms of improvement, the ticketing system could be better.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for about three months.
What do I think about the stability of the solution?
In terms of stability, I would rate it an eight out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of the solution a solid eight out of ten. It could be slightly improved. Approximately 1000 people use Harmony Endpoint at our company. The maintenance is done once a week by a team of three engineers.
How are customer service and support?
In the Harmony series, the products are linked to each other. It is a little tricky when you try to open a case and give it to an engineer because, in our custom environment, we have to access it from their devices. For example, in Harmony Mobile, their Android or iPhone devices have to be used. All of that takes time and it would be good if Check Point could find a better solution to this and create a feature to help us collect logs for the cases. I would rate the support a six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I'm currently working with Cisco Secure Endpoint and Palo Alto Cortex XDR.
How was the initial setup?
We use both the cloud and on-premise solutions. The initial setup is simple and creating a profile with the agents is easy. We only create agents and direct them to versions of the agents while we integrate them with the process. It only takes about five minutes to deploy one mission.
What was our ROI?
We have seen good results with the solution. If it is used with Linux or Mac, it provides better performance.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Endpoint is a subscription-based solution and the pricing is quite reasonable when compared to other solutions on the market. I would give it a nine out of ten in terms of affordability.
What other advice do I have?
My advice to people who are considering using Check Point Harmony Endpoint is to be careful of which version you choose while deploying the solution. You should get the recommended versions for the agents. Otherwise, there will be a lot of problems and soft ticketing. Overall, I would rate Harmony Endpoint a seven out of ten.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer:
Buyer's Guide
Check Point Harmony Endpoint
March 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
841,004 professionals have used our research since 2012.
Head of Security and Operational Risk at Medianet
Great real-time click protection, web filtering, and compatability
Pros and Cons
- "We are able to manage all our endpoints from a single cloud console."
- "It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products."
What is our primary use case?
As a financial company, we use the solution to provide security to our CDE environment and compliance with all PCI requirements. This tool enables us to provide security to the endpoints and also, to comply with local and foreign regulations regarding platform security.
We use this solution to protect all our endpoints, including personal computers and mobile phones.
We have deployed the solution in Windows, Linux servers, workstations, and mobile phones.
We also use the web filter capabilities both on mobile phones and on corporate computers.
How has it helped my organization?
We now have so many capabilities we did not have before, as follows:
- We are able to manage all our endpoints from a single cloud console
- We don't need adicional on-premise servers to run this solution
- The time that the endpoint refresh and identify new policies is very short. It takes seconds and this is a great value for us to fight emerging threats
- We are now able to protect web browsing in all web browsers and also we don't need additional policies to block browsers in private browsing
- The integratión with our SIEM solution was very smooth and the solution provides valuable information for security analysis
What is most valuable?
The most valuable aspects include:
- Web Filtering. This feature is easy to manage, and it applies new policies in seconds.
- Real-time Click Protection. It protects the user from phishing attacks in real time.
- Compatibility with Windows, Linux, Android, and Mac. We don't need additional solution to protect all our endpoint.
- Cloud Management. This feature allows us to reduce our operating burden and also improve our TCO.
We now have the ability to block a compromised machine from the network.
We now have the ability to block in near real-time IOC.
What needs improvement?
It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.
It would also be great to include FIM capabilities for the Endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.
It would be great if we could have additional DLP capabilities to identify personal information or any kind of information to comply with regulations that require information protection.
For how long have I used the solution?
I have been using the solution for about three months.
What do I think about the stability of the solution?
We haven't had any problems or downtime since we acquired the solution. It is stable.
What do I think about the scalability of the solution?
The solution is scalable. It is quite simple to add new endpoints to the solution or add additional features, all with zero downtime.
How are customer service and support?
Customer support and channel support are also always willing to help.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have been using McAfee Endpoint protection for about ten years. We were missing so many features and needed additional tools and effort to protect our endpoint.
How was the initial setup?
It took a few minutes to deploy the whole solution.
What about the implementation team?
It was through a vendor. They were experts on the product.
What's my experience with pricing, setup cost, and licensing?
The costs depend on the company size. In my case, I was able to have all the features, including email protection, remote access, mobile protection, and endpoint protection, for a great price.
Which other solutions did I evaluate?
I evaluated Trend Micro and McAfee.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Developer at Shavit-security
Incorporates security AI features and effectively manages bandwidth with its DRS capabilities, but the software could be more resource-efficient
Pros and Cons
- "This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities."
- "The software requires considerable resources and can strain less powerful computers."
What is our primary use case?
We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.
What is most valuable?
This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.
What needs improvement?
Perhaps the software could be made more resource-efficient. While many improvements come to mind, I don't have them readily available. Essentially, I aim to enhance the software's efficiency so that it places fewer demands on computer resources.
For how long have I used the solution?
I have been working with Check Point Harmony Endpoint for the past two years.
What do I think about the stability of the solution?
It is a stable solution and I would rate it seven out of ten.
What do I think about the scalability of the solution?
It isn’t very scalable since I wasn't able to bypass the security a couple of times. I would rate it a six out of ten.
How was the initial setup?
I would rate it a six out of ten because it could have been easier. It might be somewhat challenging due to the numerous policies in place. For instance, it's more straightforward for me when users can easily set up policies because they come built-in. However, with Check Point, you do have the option to create custom policies. I'm not entirely certain if it's a strict either/or situation, as there might be some flexibility. Nonetheless, having a predefined "zero one" option can make it easier for users, as they don't necessarily have to customize policies themselves.
The deployment takes long enough.
What other advice do I have?
Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best.
I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Software Engineer at Doddle
Great support with faster data processing capabilities and a high level of security
Pros and Cons
- "Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
- "It blocks safe URLs sometimes when there are network interruptions."
What is our primary use case?
We deployed this product to harmonize our products and have one central access point.
It helps us to set security features that protect the computing devices from malware attacks.
It gives me an opportunity to manage applications that works on various workflows centrally.
Integration with all employee devices has enabled my team to monitor the security situation and put in place emergency measures in case of any threat.
Team members can connect their working devices from a central networking connection that is secure and reliable.
How has it helped my organization?
The high-level security provided by Check Point Harmony Endpoint has given my team all the required tools for setting up a central network control platform. It provides solutions to challenges that affect workflows slowing down performance.
There is improved business work processes agility that keeps all the sectors functional.
There has been improved security compliance and risk management in all the business transactions that we undertake since we deployed this application.
Laptops and mobile devices that operate within the enterprise have been secured, and teams can easily focus on more productive roles without fear of being attacked.
What is most valuable?
Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information.
The cloud management system provides security to hybrid information and saved files.
The customer support services are efficient and always reliable when reached for any consultation.
It supports operating systems that are deployed in computers and mobile devices.
New users familiarize themselves easily with the operation of UI since it has flexible dashboards.
The faster data processing capability saves time and costs for accomplishing given tasks.
What needs improvement?
It has full performance capability to execute the given duties.
It blocks safe URLs sometimes when there are network interruptions.
The cost of deployment varies with the existing working conditions and the organization's size.
The cloud networking infrastructure can be attacked if there are limited security features and poor monitoring capacity from the IT team.
The overall performance impressed my team. Check Point Harmony Endpoint is the sure deal for enterprise security coverage and computing device control.
For how long have I used the solution?
I've used the solution for ten months.
What do I think about the stability of the solution?
It is stable in the provision of reliable security.
What do I think about the scalability of the solution?
I am impressed by the performance of this product.
How are customer service and support?
The customer support staff is ever supportive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not used a similar solution previously.
How was the initial setup?
The initial setup procedure was straightforward.
What about the implementation team?
There was high-level expertise from the vendor team during implementation.
What was our ROI?
There has been a positive ROI since we deployed it.
What's my experience with pricing, setup cost, and licensing?
The setup cost and licensing terms vary according to enterprise size.
Which other solutions did I evaluate?
I evaluated several options. This platform was the best.
What other advice do I have?
I recommend the implementation of this platform in other organizations.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Security Officer at a tech services company with 1,001-5,000 employees
Easy to use with good application control and great endpoint protection
Pros and Cons
- "It is quite easy to use and deploy the agent on endpoints to protect them from bad actors."
- "Sometimes the portal loads slowly which should be improved."
What is our primary use case?
We primarily use the solution for protecting our endpoints from malware. We've provided features to group the endpoints and apply specific policies by including or excluding them in a certain policy group.
It's great for endpoint security and protection. We are using the VPN feature as well to connect to the corporate network of our organization, which is a good feature. It's used for scanning malware and other malicious files on endpoints which greatly enhances our security posture for endpoints, including Windows and Macs and other operating systems as well.
How has it helped my organization?
Check Point Harmony Endpoint benefits a lot to organizations by providing endpoint protection. There is centralized management through the Harmony portal, which is really nice.
It is quite easy to use and deploy the agent on endpoints to protect them from bad actors.
Daily signatures updates are really good and helpful in protecting against zero day vulnerabilities and exploits.
The firewall and application control greatly improves our security posture. End users are unable to install any suspicious or malicious apps in our environment.
What is most valuable?
The sandblast agent, policies implementation, and logs are quite valuable aspects of the solution.
Threat emulation and anti-exploits are great features to protect the endpoints.
The remote access VPN within the endpoint agent is quite easy to set up and use.
The Harmony portal allows us to do a single sign-on using our active directory which makes the life of admins easy.
Harmony Endpoint scans all website before opening and also scans fields on the website that protects from XSS and CSRF attacks which is really an advanced level feature.
The endpoint scanning tools are quite enhanced and detect most malicious files.
What needs improvement?
Sometimes the portal loads slowly which should be improved.
There should be an easy option for the administrator to turn off or disable malware protection on a specific asset or computer instead of adding a specific asset in a Disable group as that will make it easy for the admin to disable if and when required for some testing purpose. I would like this feature to be added.
Logs searching also needs to be more quick and enhanced and more metadata should be stored in the logs for Endpoint for a better view for admins.
For how long have I used the solution?
I've been using the solution for two years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Engineer at a financial services firm with 51-200 employees
Resilient by design, provides redundancy, and offers ongoing constant improvements
Pros and Cons
- "We love that we don't have to upgrade it anymore. They take care of that."
- "It would be ideal if they had a migration tool of some sort."
What is our primary use case?
There have been improvements in the way our organization functions, as, from an administrative perspective, and being available and taking upgrades out of our court if our users need it, it's going to be out there hanging off of AWS's internet or environment. There is no downtime.
Theirs (AWS) is probably more highly available than ours. Other than that, it's supposed to be the same product that we were using. It's a Check Point Management Station to a Check Point Management Station in the cloud. Basically, it's not that much of a difference. We have upgraded all the clients since, and we're on one of the later versions of the VPN clients that are supported by the new Management Station. The old Management Station wasn't supporting the newer clients anymore.
The new clients seem to be faster and more stable. Those are improvements that everyone in the company can appreciate. They can VPN and connect faster. They're more resilient. I've noticed that they try to reconnect. If our internet goes out for 20 minutes and you VPN'd in, it will actually reconnect on its own at the same token, which is amazing. Before, if only the slightest instability of the internet connection disconnected you from VPN, you were then required to put in your RSA token and password, and username. That is annoying for people as a lot of people's WiFi's aren't that great and/or they're in some airport or something and might momentarily disconnect.
What is most valuable?
We love that we don't have to upgrade it anymore. They take care of that.
The upgrade process was nice with the new Management Station compared to the old one. I like how they have the clients already available. I didn't have to download them and upload them as I did with the old Management Station.
We're happy with the solution overall as it takes away the administrative overhead of operating it and patching it and being able to also sign in through the web browser anywhere as opposed to just having to VPN back to our work and connect to the Management Station in order to use it. We can just use the Check Point portal and just use any browser anywhere. That gives us more options, which we like.
I've noticed they're constantly updating the interface and making it easier to use, which I appreciate. When we first started using it, it was really laggy and it was really slow and it was hard to sort some of the computers and users, however, they make updates almost every time that I log in. It gets better and better every day. It has gotten better and it's not as slow as it was.
There seem to be constant improvements happening, which you can't say for everything. We don't have to upgrade to get the benefits of the improvements, either. That takes a lot off of our plate and allows us to focus on other things. We're taking the good with the bad and the bad seem to be one-offs and we're looking forward to the future.
Therefore, the most valuable feature is its ability to take the management and the administration of the product off of our plate and onto their plate. We don't have to worry about upgrading it, creating downtime, working off-hours, doing all the research and stress of seeing if it's compatible, if there are problems, letting them test it. That's nice. Previously, we would upgrade our products or patch them maybe two to four times a year, depending on if there's a security vulnerability. Each time we do something like that, it was about three to four hours of downtime. Now, that process doesn't exist.
Before, with on-premise, we had two Management Stations. One was primary, one was secondary and there were two different data centers in case one data center was down. The other one would come up and be the Management Station for all of the clients. Now, in this case, we only have one. It's in their cloud. Their cloud is in AWS. It's a great thing. It's resilient by design and it provides redundancy in a single source of administration for us. We like that too
What needs improvement?
It would be ideal if they had a migration tool of some sort.
There were some caveats that we encountered on the new Management Station. For example, they had some features that were not supported by older clients. There are the clients that are running on the laptops, and there are the Management Stations, and then we had one on-premise, which was older in terms of the clients that we were running. Then we had the new Management Station in the Cloud that Check Point is administering as it is a SaaS, which is a benefit.
The newer Management Station has features that it enforced on the clients that the clients weren't able to support. For example, Windows Service or Windows Subsystem Linux. Everyone in my company that uses Windows Subsystem Linux, which is about 15 or 20 people, that need it on a daily basis, were running the older clients of course, as they were migrated over the new Management Station and they weren't allowed to use that. It was being blocked automatically due to the fact that that was the new policy being enforced that was literally a tick box in the new Management Station that I didn't set. Even if I enabled WSL, it didn't matter. The older clients couldn't take advantage of the new newer Management Station telling them to use it. That was annoying trying to troubleshoot that and figure it out. tNo one at Check Point really knew that was the problem. It took a while to resolve. We finally figured out upgrading may solve the problem. When we did that, we upgraded those users, however, that created a little bit of an issue in the company, as we upgraded those users. We like to test them with a small group and make sure they're stable and make sure nothing weird happens. We were forced to upgrade them without testing first.
One thing they still haven't improved on from the old Management Station to the new Management Station, which should totally be an improvement, is when you create a Site List for the VPN clients and you deploy it from the Management Station, you are not able to get that Site List. You have to play around with something called the Track File, which is a miserable process. You have to download the client, decrypt the Track File, edit it, then upload it again to the Management Station and download the client a second time and then test it and make sure the Track File's in the right order of sites as well, due to the fact that it's kind of random how it decides to order the Site List. The Site List is what the clients use to connect to the VPN Gateway, and if you have more than one gateway, for example, for disaster recovery, which we do, then they'll need that list.
It's something they've never improved on, which I was hoping by going to the cloud and having this whole thing recreated. Since it's more advanced I thought they'd have that ability to edit the Site List with the initial download. You should be able to just add the sites and then that's it. That kind of sucks that you can't.
Other than that, the only other thing I could complain about was that they did this process where they did some type of certificate update on the backend of all of their staff solutions. That created downtime for our VPN clients and they didn't notify us of the certificate update. We're using the product in their cloud as opposed to their product on-premise, which seemed to be more stable in that regard. They didn't communicate that out. However, when we spoke to support after about a week, they told us there was this thing they did the past week, and that's the reason why we had that problem. Everyone that had that product had that problem. That really wasn't ideal.
For how long have I used the solution?
I've been using the solution for about a year. Maybe a little bit more.
We've been a Check Point shop for approximately 15 years. We're very well versed in Check Point.
What do I think about the scalability of the solution?
Seeing that it's in the Cloud, I think it's very scalable and I am impressed with that aspect of it.
For this solution, in particular, we are using 100% of the Cloud VPN Management Station and all users are phoning home up into the cloud. We're going to stick with it unless they have some severe outages or certificate updates without telling us like they did last time. Right now, there's no reason for us to change and I'm very pleased with the product.
How are customer service and support?
To set it up, we relied heavily on technical support as it was new. That said, it's really the same ball of wax, so we're good now. It was just the initial setup we needed help with as it was new to us. We hadn't done much. We had to learn how to connect our software clients to the cloud. We had to use special cloud keys that were proprietary to Check Point. It's like learning a new suite from Check Point.
We literally got on this as it was cutting edge. We're like one of their first customers using their SaaS. We were using their VPN and Smart-1 Cloud before most people. When we were setting it up, we're setting it up with their actual product engineers or whatever. It was interesting.
They changed it a lot since we started setting it up.
I'd call them to their support and they didn't even know about anything due to the fact that the support wasn't even trained on the cloud yet. They weren't even trained on their Smart-1. They would just say "we don't know about that yet and/or we can't help you." It was kind of funny. I told our sales team that and they got pissed.
They called them and they're like, no one should ever tell the customer that you don't know about this yet and it became a big deal in Check Point.
That said, I'd rate their service as pretty high. I respect those in the endpoint or firewall department as they largely understand what's going on. At the same time, they do need to get people more people trained up. They don't seem to have trouble keeping people around for a few years so that they learn.
How was the initial setup?
After signing up with Check Point, the migration of users took about a month and a half.
We had to build out the Management Station in Check Point too and that took from probably January to almost July as we had to build it from scratch. They didn't have a migration tool for our current policy, as it enforces firewall policy on the endpoints locally on the local firewall and that wasn't ideal. We had to build that whole Management Station from scratch.
I had to go back and forth between the on-premise Management Station and the Cloud Management Station and literally look at every single feature, every single function, every single rule. I had to recreate every single object. I had to recreate every single everything. That took a very long time.
It was very manual. It's literally two screens and comparing items. That took a couple of months while doing other things, of course. However, that was my priority for about a month and a half. I worked on that a lot. I wish they had a migration tool, like a migrate export for the policy and the features. Once that was created, however, everything pretty much worked. That said, there were a couple of caveats.
What other advice do I have?
We're customers of Check Point.
I've been working on setting it up and migrating users from the on-premise platform since January of this year. This is their Cloud Endpoint, VPN Management Station versus their on-premise VPN Management Station for Endpoint. We had to migrate the users from the on-premise version using a special tool that you have to ask them to make, which is kind of weird, however, their product is so new that that's the way that they do it. I had to deploy that tool to all the users in our company and that switched them over to their Cloud Management Station.
I'd rate the solution at an eight out of ten. There's room for improvement, however, I respect it and it works well.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of IT Operations at Puerta de Hierro Hospitals
Great for remote workers with excellent endpoint agents and easy communication with the console
Pros and Cons
- "The communication with the console is very dynamic and remote, without the need to return to the computer locally."
- "There needs to be compatibility with the most recent versions of the various operating systems."
What is our primary use case?
The main option for which this solution is used is to have all the peripheral equipment protected - avoiding risks due to malware and viruses. The solution can be managed by device, with filtering and analysis of the information of all collaborators available there.
It's used to analyze emails from key users and for content filtering rules. It does not allow dangerous downloads, which protects the work of the organization outside the main network. It gives tools to the collaborators to make the work outside the installations (home office) easy.
How has it helped my organization?
With COVID affecting the world, a solution was needed that could be able to provide security at workstations outside of the organization itself. With the sandblast tool, coverage is made on the equipment that we provide (laptops) and employees can carry out their activities from home. The tool has provided us with security to ensure that the computers are protected while also providing information analysis. It offers easy control and implementation of content filtering rules. Thus, you have control of all the organization's teams outside and within the operational network.
What is most valuable?
The endpoint agents, which can be installed in one go, are great. The communication with the console is very dynamic and remote, without the need to return to the computer locally.
From the administration console, we can generate content filtering rules and labels, as well as run an analysis of emails and downloads that the collaborator does to fulfill their functions. Informing the administrator of threats by mail gives us the facility to detect real-time vulnerabilities in order to continue fulfilling the objective of safeguarding the information of the organization.
What needs improvement?
There needs to be compatibility with the most recent versions of the various operating systems. They need to be up-to-date with the signatures of new viruses and the latest ramsonware. With the encompassing of all its solutions in one platform, there should be artificial intelligence for specific analysis to thus be able to anticipate and detect unique risks to the organization.
To be able to count on the administration console on any device and online cloud would be ideal. We would like there to be no need to install clients as executables.
For how long have I used the solution?
I've been using the solution for one year.
What do I think about the scalability of the solution?
We like the idea of continuing to implement more solutions offered by Harmony.
How are customer service and technical support?
Technical support is good. They comply when we need support or have product questions.
Which solution did I use previously and why did I switch?
No, Sandblast was chosen as the first option.
What's my experience with pricing, setup cost, and licensing?
The solution meets our business needs.
Which other solutions did I evaluate?
We did look at Fortinet solutions.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
SentinelOne Singularity Complete
Cisco Secure Endpoint
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
Symantec Endpoint Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Trellix Endpoint Security
Kaspersky Endpoint Security for Business
HP Wolf Security
ESET Endpoint Protection Platform
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?
Harmony Endpoint is an endpoint security solution built to protect the remote workforce from today's complex threat landscape. It prevents potential threats to the endpoint, such as ransomware, phishing, or malware redirection, while quickly minimizing breach impact with its autonomous detection and response capability. This way, your organization gets all the endpoint protection it needs in a quality, efficient and cost-effective solution it deserves.